Domain Name System Tunnelling and Security

Abstract

The exponential rise in the usage of the internet and challenges necessitates the importance and use of the Domain Naming System (DNS). Despite the benefits, DNS is susceptible to abuse which calls for appropriate security solutions against such abuse.

We will write a
custom essay
specifically for you

for only $16.05 $11/page
308 certified writers online
Learn More

Introduction

A report by the Internet World Stats (1) on the internet usage statistics based on ITU data shows that by March 2013, over 2,749 million users had visited the internet, and were actively involved in browsing the internet. The report details the usage characteristics of the internet based on the gender divide of men and women in the developed and developing world. Research shows that the visitors on the internet do not know that access is enabled through a domain name system, making access to any information among millions of records possible. Without the domain naming system, it could be impossible for the users to trace millions of hosts using IP addresses (Internet World Stats 1). In this case, the number of DNS records consisting of updated records shown by the number of chunks provides the basis for showing the downloaded malicious code by the regular index chunk is indicated by the number of chunks.

According to Aitchinson (36), DNS is an abbreviation for Domain Name System, which provides a hierarchical framework for translating internet domain names and hostnames to Internet Protocol (IP) addresses. The system allows applications to function using names such as Google.com by replacing difficult to remember IP addresses (Aitchinson 36).

The importance of DNS was to address the need for load balancing by spreading the operational loads across servers, controls the order of RRs, balancing mails and FTP services, and enables the delegation of the administration of name servers (Aitchinson 201). With the resolution and mapping of IP addresses and domain names, it has become easy to access the internet without the need to remember IP addresses (Aitchinson 207). The DNS system responds to recursive, iterative, or inverse queries from local or remote servers (Aitchinson 73).

Research by Anderson (1) of a quantitative and qualitative analysis of the number of DNS queries between 2004 July, 11 and 2013, July, 13 to be 8,614,652 daily respectively shows a significant number of queries as shown from the statistics are processed daily (Anderson 1).

According to Aitchinson (40), DNS abuses include the use of restricted services by an unauthenticated host, evading captive portals, co-operate espionage, malware, evading network policies and rules, and abusing slack space. DNS tunneling abuse includes DDoS attacks, evading captive portals, Advanced Persistent Threat (APT), command and control, and data exfiltration. However, good uses include the provision of capabilities to add security layers to the DKIM and SPF protocols. Avoidance of the abuse is done through the verification of the digital signatures by the client computer, countering the possibility of compromise by a man-in-the-middle attack. Also, a DES encryption and decryption ensures further security in a DNS query response cycle (Aitchinson 209).

Conclusion

The Domain Name System (DNS) is a naming system for translating IP addresses into domain names and vice versa in a hierarchical system. Domain tunneling involves encapsulating IP and upstream traffic and the use of records. The limitations include the requirement for encoding the upstream traffic with base32 encoded. DNS tunneling provides an effective mechanism for bypassing firewalls.

Get your
100% original paper
on any topic

done in as little as
3 hours
Learn More

Works Cited

Aitchinson, Ronald, G.f. Pro DNS and BIND, New York: Press, 2011.

Anderson, Joshua, DNS Query Stats 2013. Web.

Internet World Stats 2013. Web.

Print Сite this

Cite this paper

Select style

Reference

StudyCorgi. (2021, May 4). Domain Name System Tunnelling and Security. Retrieved from https://studycorgi.com/domain-name-system-tunnelling-and-security/

Work Cited

"Domain Name System Tunnelling and Security." StudyCorgi, 4 May 2021, studycorgi.com/domain-name-system-tunnelling-and-security/.

1. StudyCorgi. "Domain Name System Tunnelling and Security." May 4, 2021. https://studycorgi.com/domain-name-system-tunnelling-and-security/.


Bibliography


StudyCorgi. "Domain Name System Tunnelling and Security." May 4, 2021. https://studycorgi.com/domain-name-system-tunnelling-and-security/.

References

StudyCorgi. 2021. "Domain Name System Tunnelling and Security." May 4, 2021. https://studycorgi.com/domain-name-system-tunnelling-and-security/.

References

StudyCorgi. (2021) 'Domain Name System Tunnelling and Security'. 4 May.

Copy to clipboard

This paper was written and submitted to our database by a student to assist your with your own studies. You are free to use it to write your own assignment, however you must reference it properly.

If you are the original creator of this paper and no longer wish to have it published on StudyCorgi, request the removal.

Psst... Stuck with your
assignment? 😱
Susan
Online
Psst... Stuck with your assignment? 😱
Do you need an essay to be done?
Yes
What type of assignment 📝 do you need?
Yes
How many pages (words) do you need? Let's see if we can help you!
Yes